A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

被引:62
|
作者
Shin, Sooyeon [1 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 03722, South Korea
关键词
Wireless sensor networks; Authentication; Sensors; Authorization; 5G mobile communication; Internet of Things; Three-factor authentication; authorization; key agreement; elliptic curve cryptography; anonymity; untraceability; 5G network; wireless sensor networks; the~Internet of Things; ELLIPTIC-CURVE CRYPTOGRAPHY; USER AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURITY; PROTOCOL; IMPLEMENTATION; LIGHTWEIGHT;
D O I
10.1109/ACCESS.2020.2985719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT & x2019;s communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to allow IoT to penetrate deeply into our daily lives and to provide various services that are convenient, but at the same time, it also brings new security threats. From this aspect, user authentication and key agreement are essential for secure end-to-end communication. As IoT devices, including sensors, collect and process more and more personal information, both anonymous authentication and authorization are also required to protect the privacy and to prevent anyone without privileges from accessing private data. Recently, Adavoudi-Jolfaei <italic>et al.</italic> proposed an anonymous three-factor authentication and access control scheme for real-time applications in WSNs. However, we found that this scheme does not provide sensor-node anonymity and suffers from user collusion and desynchronization attacks. In this paper, we introduce a system architecture by considering the integration of WSNs and 5G for IoT. Based on a cryptanalysis of Adavoudi-Jolfaei <italic>et al.</italic>& x2019;s scheme and the system architecture, we propose an elliptic curve cryptography (ECC)-based privacy-preserving authentication, authorization, and key agreement scheme for WSNs in 5G-integrated IoT. We conduct a formal and informal security analysis in order to demonstrate that the proposed scheme withstands various security attacks and guarantees all desired security features, overcoming the drawbacks of Adavoudi-Jolfaei <italic>et al.</italic>& x2019;s scheme. Finally, a performance and comparative analysis with the related schemes indicate that the proposed scheme is both efficient and more secure.
引用
收藏
页码:67555 / 67571
页数:17
相关论文
共 50 条
  • [1] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (01) : 101 - 116
  • [2] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 101 - 116
  • [3] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [4] A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
    Xie, Qi
    Ding, Zixuan
    Hu, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [5] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [6] Blockchain-based Privacy-preserving Authentication Key Agreement Protocol for Industrial Wireless Sensor Networks
    Su, Xing
    Xie, Yong
    Wang, Hongyuan
    Wang, Hui
    [J]. 2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 234 - 241
  • [7] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [8] A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Wang, Feng
    Tinashe, Magara
    [J]. ELECTRONICS, 2019, 8 (04):
  • [9] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Das, Manik Lal
    Kumar, Pardeep
    Martin, Andrew
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 339 - 353
  • [10] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Manik Lal Das
    Pardeep Kumar
    Andrew Martin
    [J]. Wireless Personal Communications, 2020, 110 : 339 - 353